Over 300,000 Android users have downloaded these banking trojan malware apps, say security researchers (2024)

Over 300,000 Android smartphone users have downloaded what turned out to be banking trojans after falling victim to malware that has bypassed detection by the Google Play app store.

Detailed bycybersecurity researchers at ThreatFabric, the four different forms ofmalwareare delivered to victims via malicious versions of commonly downloaded applications, including document scanners, QR code readers, fitness monitors and cryptocurrency apps. The apps often come with the functions that are advertised in order to avoid users getting suspicious.

In each case, the malicious intent of the app is hidden and the process of delivering the malware only begins once the app has been installed, enabling them to bypass Play Store detections.

SEE:A winning strategy for cybersecurity(ZDNet special report)

The most prolific of the four malware families is Anatsa, which has been installed by over 200,000 Android users – researchers describe it as an "advanced"banking trojanthat can steal usernames and passwords, and uses accessibility logging to capture everything shown on the user's screen, while a keylogger allows attackers to record all information entered into the phone.

Anasta malwarehas been active since January, but appears to have received a substantial push since June – researchers were able to identify six different malicious applications designed to deliver the malware. These include apps that posed as QR code scanners, PDF scanners and cryptocurrency apps, all of which deliver the malware.

One of these apps is a QR code scanner, which has been installed by 50,000 users alone, and the download page features a large number of positive reviews, something that can encourage people to download the app. Users are directed to the apps viaphishing emailsormalicious ad campaigns.

After the initial download, users are forced to update the app to continue using it – it's this update that connects to a command and control server and downloads the Anatsa payload onto the device, providing attackers with the means to steal banking details and other information.

The second most prolific of the malware families detailed by researchers at ThreatFabric is Alien,an Android banking trojanthat can also steal two-factor authentication capabilities and which has been active for over a year. The malware has received 95,000 installations via malicious apps in the Play Store.

One of these is a gym and fitness training app that comes with a supporting website designed to enhance the legitimacy, but close inspection of the site reveals placeholder text all over it. The website also serves as the command and control centre for the Alien malware.

Like Anasta, the initial download doesn't contain malware, but users are asked to install a fake update – disguised as a package of new fitness regimes – which distributes the payload.

The other two forms of malware that have been dropped using similar methods in recent months are Hydra andErmac,which have a combined total of at least 15,000 downloads. ThreatFabric has linked Hydra and Ermac to Brunhilda, a cyber-criminal group known to target Android devices with banking malware. Both Hydra and Ermac provide attackers with access to the device required to steal banking information.

SEE: The IoT is getting a lot bigger, but security is still getting left behind

ThreatFabric has reported all of the malicious apps to Google and a Google spokesperson confirmed to ZDNet that the apps named in the report have been removed from the Play Store. Cyber criminals will continually attempt to find ways to bypass protections to deliver mobile malware, which is becoming increasingly attractive to cyber criminals.

"The Android banking malware echo-system is evolving rapidly. These numbers that we are observing now are the result of a slow but inevitable shift of focus from criminals towards the mobile landscape. With this in mind, the Google Play Store is the most attractive platform to use to serve malware," Dario Durando, mobile malware specialist at ThreatFabric, told ZDNet.

The convincing nature of the malicious apps means that they can be hard to identify as a potential threat, but there are steps users can take to avoid infection

"A good rule of thumb is to always check updates and always be very careful before granting accessibility services privileges – which will be requested by the malicious payload, after the "update" installation – and be wary of applications that ask to install additional software," said Durando.

MORE ON CYBERSECURITY

Over 300,000 Android users have downloaded these banking trojan malware apps, say security researchers (2024)

FAQs

Over 300,000 Android users have downloaded these banking trojan malware apps, say security researchers? ›

Over 300,000 Android users have downloaded these banking trojan malware apps, say security researchers. Cybersecurity researchers at ThreatFabric detail how password-stealing Android banking trojans were disguised as QR code readers, fitness monitors, cryptocurrency apps and more.

What is Android banking malware? ›

By masquerading as everyday mobile apps for things like QR code readers, fitness trackers, and productivity or photography tools, Android banking trojans intercept a person's online interest in one app, and instead deliver a malicious tool that cybercriminals can abuse later on.

What is banking Trojan malware? ›

A Banker Trojan is a malicious computer program designed to gain access to confidential and/or material information stored or processed through online banking systems.

Which is the topmost malware when it comes to key Trojan attacks? ›

Trojan attacks have been responsible for causing major damage by infecting computers and stealing user data. Well-known examples of Trojans include: Rakhni Trojan: The Rakhni Trojan delivers ransomware or a cryptojacker tool—which enables an attacker to use a device to mine cryptocurrency—to infect devices.

What is the Trojan horse in money laundering? ›

In the context of money laundering, the “Trojan horse” metaphor illustrates how illicit funds are concealed within legitimate financial systems. Understanding the demand and supply sides of these practices offers insight into their mechanics and the broader economic implications.

Is it safe to use banking apps on Android phones? ›

It's difficult to find software or technology that is entirely risk-free, and that holds true for mobile banking apps. The 2021 Nokia Threat Intelligence Report indicated that 50% of banking malware is targeted toward Android users, because Androids run on a fully open-source operating system.

How do I permanently remove malware from my Android phone? ›

How Do I Completely Remove Malware from Android?
  1. Step 1: Immediately Turn Your Phone Off Before Performing Some Research. ...
  2. Step 2: Turn the Phone On in Safe Mode or Emergency Mode. ...
  3. Step 3: Go to Device Settings to Locate the Malicious App. ...
  4. Step 4: Uninstall the Infected Application. ...
  5. Step 5: Opt For A Factory Reset.

How do I get rid of Trojan malware? ›

Can Trojan viruses be removed? Trojan viruses can be removed in various ways. If you know which software contains the malware, you can simply uninstall it. However, the most effective way to remove all traces of a Trojan virus is to install antivirus software capable of detecting and removing Trojans.

Can malware access my bank account? ›

Hacking your data: Hackers can steal your money remotely

Hackers have created malicious software (known as malware or Trojans) that attack bank apps. If you're tricked into downloading malware onto your phone, a scammer can spy on you and steal your mobile banking username and password.

How do you know if you have Trojan malware? ›

Unverified startup items and suspicious programs can act as gateways for trojans to install harmful code in your computer and other devices. If you notice any new programs running on your system that you did not install, it could be a trojan.

What software can be used to steal bank information? ›

SpyEye is a data-stealing malware (similar to Zeus) created to steal money from online bank accounts. This malicious software is capable of stealing bank account credentials, social security numbers, and financial information that could be used to empty bank accounts.

What are the 5 malware programs? ›

7 types of malware
  • Virus. Viruses are a subgroup of malware. ...
  • Worms. A worm is a type of malicious software that rapidly replicates and spreads to any device within the network. ...
  • Trojan virus. Trojan viruses are disguised as helpful software programs. ...
  • Spyware. ...
  • Adware. ...
  • Ransomware. ...
  • Fileless malware.

Which malware is hard to detect? ›

Fileless malware is designed to evade detection by replacing custom malicious code with the use of functionality built into the target system. This makes this type of malware more difficult to detect because it lacks the standalone file that matches the signatures stored by some antivirus applications.

What is washing cash? ›

Money laundering involves disguising financial assets so they can be used without detection of the illegal activity that produced them. Through money laundering, the criminal transforms the monetary proceeds derived from criminal activity into funds with an apparently legal source.

Is money laundering washing money? ›

Money laundering is an illegal activity that makes large amounts of money generated by criminal activity, such as drug trafficking or terrorist funding, appear to have come from a legitimate source. The money from the criminal activity is considered dirty, and the process “launders” it to look clean.

What is cash structuring? ›

Cash structuring is the act of breaking up what would otherwise be a single significant financial transaction into a series of smaller transactions to avoid scrutiny by regulators and law enforcement. Cash structuring is also known as “smurfing” in the industry.

What are the signs of malware on Android? ›

Device symptoms
  • Alerts about a virus or an infected device.
  • Anti-virus software you use no longer works or runs.
  • A significant decrease in your device's operating speed.
  • A significant, unexpected decrease in storage space on your device.
  • Your device stops working properly or working altogether.

What is an example of Android malware? ›

The prominent Android malware categories include adware, backdoor, file infector, PUA, ransomware, riskware, scareware, spyware, trojan, trojan-sms, trojan-spy, trojan-banker, and trojan-dropper.

How do I know if my Android app has malware? ›

Check for Android malware using Play Protect
  1. Open the Play Store on the Android device you want to scan.
  2. Tap on your profile in the upper-right corner.
  3. Tap on Play Protect.
  4. Tap Scan.
  5. Tap on the option to remove any detected malware.
Jan 5, 2023

Top Articles
Latest Posts
Article information

Author: Merrill Bechtelar CPA

Last Updated:

Views: 6141

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Merrill Bechtelar CPA

Birthday: 1996-05-19

Address: Apt. 114 873 White Lodge, Libbyfurt, CA 93006

Phone: +5983010455207

Job: Legacy Representative

Hobby: Blacksmithing, Urban exploration, Sudoku, Slacklining, Creative writing, Community, Letterboxing

Introduction: My name is Merrill Bechtelar CPA, I am a clean, agreeable, glorious, magnificent, witty, enchanting, comfortable person who loves writing and wants to share my knowledge and understanding with you.